Ninja: Towards Transparent Tracing and Debugging on {ARM} Z Ning, F Zhang 26th USENIX Security Symposium (USENIX Security 17), 33-49, 2017 | 67 | 2017 |
Understanding the security of arm debugging features Z Ning, F Zhang 2019 IEEE Symposium on Security and Privacy (SP), 602-619, 2019 | 45 | 2019 |
Position paper: Challenges towards securing hardware-assisted execution environments Z Ning, F Zhang, W Shi, W Shi Proceedings of the Hardware and Architectural Support for Security and …, 2017 | 44 | 2017 |
Preliminary study of trusted execution environments on heterogeneous edge platforms Z Ning, J Liao, F Zhang, W Shi 2018 IEEE/ACM Symposium on Edge Computing (SEC), 421-426, 2018 | 28 | 2018 |
Strongbox: A gpu tee on arm endpoints Y Deng, C Wang, S Yu, S Liu, Z Ning, K Leach, J Li, S Yan, Z He, J Cao, ... Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022 | 25 | 2022 |
KShot: Live kernel patching with SMM and SGX L Zhou, F Zhang, J Liao, Z Ning, J Xiao, K Leach, W Weimer, G Wang 2020 50th Annual IEEE/IFIP International Conference on Dependable Systems …, 2020 | 20 | 2020 |
{SHELTER}: Extending Arm {CCA} with Isolation in User Space Y Zhang, Y Hu, Z Ning, F Zhang, X Luo, H Huang, S Yan, Z He 32nd USENIX Security Symposium (USENIX Security 23), 6257-6274, 2023 | 13 | 2023 |
RetTag: Hardware-assisted return address integrity on RISC-V Y Wang, J Wu, T Yue, Z Ning, F Zhang Proceedings of the 15th European Workshop on Systems Security, 50-56, 2022 | 13 | 2022 |
Hart: Hardware-assisted kernel module tracing on arm Y Du, Z Ning, J Xu, Z Wang, YH Lin, F Zhang, X Xing, B Mao Computer Security–ESORICS 2020: 25th European Symposium on Research in …, 2020 | 13 | 2020 |
Hardware-assisted transparent tracing and debugging on ARM Z Ning, F Zhang IEEE Transactions on Information Forensics and Security 14 (6), 1595-1609, 2018 | 13 | 2018 |
Understanding the security of traffic signal infrastructure Z Ning, F Zhang, S Remias Detection of Intrusions and Malware, and Vulnerability Assessment: 16th …, 2019 | 11 | 2019 |
DexLego: Reassembleable bytecode extraction for aiding static analysis Z Ning, F Zhang 2018 48th Annual IEEE/IFIP International Conference on Dependable Systems …, 2018 | 11 | 2018 |
Revisiting arm debugging features: Nailgun and its defense Z Ning, C Wang, Y Chen, F Zhang, J Cao IEEE Transactions on Dependable and Secure Computing 20 (1), 574-589, 2021 | 9 | 2021 |
CAGE: Complementing Arm CCA with GPU Extensions C Wang, F Zhang, Y Deng, K Leach, J Cao, Z Ning, S Yan, Z He Network and Distributed System Security (NDSS) Symposium, 2024 | 3 | 2024 |
Raft: Hardware-assisted Dynamic Information Flow Tracking for Runtime Protection on RISC-V Y Wang, J Wu, H Zheng, Z Ning, B He, F Zhang Proceedings of the 26th International Symposium on Research in Attacks …, 2023 | 2 | 2023 |
Alligator in Vest: A Practical Failure-Diagnosis Framework via Arm Hardware Features Y Zhang, Y Hu, H Li, W Shi, Z Ning, X Luo, F Zhang Proceedings of the 32nd ACM SIGSOFT International Symposium on Software …, 2023 | 2 | 2023 |
Building a lightweight trusted execution environment for arm gpus C Wang, Y Deng, Z Ning, K Leach, J Li, S Yan, Z He, J Cao, F Zhang IEEE Transactions on Dependable and Secure Computing, 2023 | 1 | 2023 |
A novel memory management for risc-v enclaves H Li, W Huang, M Ren, H Lu, Z Ning, H Cui, F Zhang Proceedings of the 10th International Workshop on Hardware and Architectural …, 2021 | 1 | 2021 |
BFTRAND: Low-latency Random Number Provider for BFT Smart Contracts J Liao, B Gong, W Sun, F Zhang, Z Ning, MH Au, W Shi The 54th Annual IEEE/IFIP International Conference on Dependable Systems and …, 2024 | | 2024 |
Armor: Protecting Software Against Hardware Tracing Techniques T Yue, F Zhang, Z Ning, P Wang, X Zhou, K Lu, L Zhou IEEE Transactions on Information Forensics and Security, 2024 | | 2024 |